Define partial, alternate,artificial,compound &natural key, Database Management System

Assignment Help:

 

Partial Key: It is a group of attributes that can uniquely identify small entities and that are related to same base entity. It is sometime named as Discriminator.

 Alternate Key: All Candidate Keys remaining the Primary Key are called as Alternate Keys.

 Artificial Key: If no obvious key either compound or stands alone is available, then the last resort is to simply give a key, by assigning a distinct number to every occurrence or record. Then this is called as developing an artificial key.

 Compound Key: If no single data component uniquely identifies occurrences within a developed, then combining multiple components to make a distinct identifier for the construct is called as creating a compound key.

 Natural Key: When one of the data components stored within a construct is used as the primary key, and then it is known the natural key.

 


Related Discussions:- Define partial, alternate,artificial,compound &natural key

What are the desirable properties of a decomposition, Define What are the d...

Define What are the desirable properties of a decomposition Ans: What are the desirable properties of decomposition - dependency preserving.  Because Lossless join and dependen

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Explain the form of the create view command, We define a view in SQL throug...

We define a view in SQL through using the create view command. To describe a view, we must provide the view a name and must state the query in which computers the view. The form of

Calculate the joint probability, Consider the following frequency counts o...

Consider the following frequency counts of some itemsets in a transaction database r : freq({A}, r) = 0.405 freq({B}, r) = 0.510 freq({C}, r) = 0.303 freq({A

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Case snerio, each publisher has uniqe name a mial addrs are also kept on ea...

each publisher has uniqe name a mial addrs are also kept on each pubisher.a publisher publish one book.a book publish y one publisher.book identified by isbn.each book writn by one

Explain the ansi -sparc schema architecture, (a) Differentiate between info...

(a) Differentiate between information and data . (b) List and briefly explain five potential benefits of the database approach compared to conventional file systems. (c) Diff

Explain generalization and aggregation in e_r diagram, Explain the concept ...

Explain the concept of generalization and aggregation in E_R diagrams. Give one example for each one of them? Generalization: Consider extending the entity set account throug

Windows 8 Administrative Tools, Which two tools are used to administer user...

Which two tools are used to administer users for Active Directory?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd